Authenticated secret key generation in delay-constrained wireless systems

被引:0
|
作者
Miroslav Mitev
Arsenia Chorti
Martin Reed
Leila Musavian
机构
[1] School of CSEE,
[2] University of Essex,undefined
[3] ETIS UMR8051,undefined
[4] CY University,undefined
[5] ENSEA,undefined
[6] CNRS,undefined
关键词
Physical layer security; Secret key generation; Physical unclonable functions; Resumption protocols; Effective capacity; QoS; Wireless communications; 5G applications;
D O I
暂无
中图分类号
学科分类号
摘要
With the emergence of 5G low-latency applications, such as haptics and V2X, low-complexity and low-latency security mechanisms are needed. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework, we propose (i) a zero round trip time (0-RTT) resumption authentication protocol combining PUF and SKG processes, (ii) a novel authenticated encryption (AE) using SKG, and (iii) pipelining of the AE SKG and the encrypted data transfer in order to reduce latency. Implementing the pipelining at PHY, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal solution to this PHY resource allocation problem is identified under security, power, and delay constraints, by formulating the subcarrier scheduling as a subset-sum 0−1 knapsack optimization. A heuristic algorithm of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms have the potential to pave the way for a new breed of latency aware security protocols.
引用
收藏
相关论文
共 50 条
  • [21] Joint Scheduling and Network Coding for Multicast in Delay-Constrained Wireless Networks
    Rajawat, Ketan
    Giannakis, Georgios B.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (12) : 6186 - 6196
  • [22] Delay-Constrained Optimal Data Aggregation in Hierarchical Wireless Sensor Networks
    Kui Wu
    Chong Liu
    Yang Xiao
    Jiangchuan Liu
    Mobile Networks and Applications, 2009, 14 : 571 - 589
  • [23] Throughput Maximization of Delay-Constrained Traffic in Wireless Energy Harvesting Sensors
    Shenoy, Vignesh
    Murthy, Chandra R.
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [24] Timing control for delay-constrained data aggregation in wireless sensor networks
    Li, Hong
    Yu, HongYi
    Yang, BaiWei
    Liu, Ana
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (07) : 875 - 887
  • [25] Secret Key Generation With Precoding and Role Reversal in MIMO Wireless Systems
    Baksi, Saygin
    Popescu, Dimitrie C.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (06) : 3104 - 3112
  • [26] On the construction of a delay-constrained maximum lifetime tree in wireless sensor networks
    Liang, Jun-Bin
    Wang, Jian-Xin
    Chen, Jian-Er
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (02): : 345 - 351
  • [27] Joint Optimization of Multicast Energy in Delay-Constrained Mobile Wireless Networks
    Fu, Luoyi
    Fu, Xinzhe
    Zhang, Zesen
    Xu, Zhiying
    Wu, Xudong
    Wang, Xinbing
    Lu, Songwu
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (01) : 633 - 646
  • [28] MIMO broadcasting with delay-constrained and no-delay-constrained services
    Zhang, R
    Cioffi, JM
    Liang, YC
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 783 - 787
  • [29] Delay-Constrained Beamforming and Resource Allocation in Full Duplex Systems
    Kabir, Mahmoud T.
    Masouros, Christos
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (03) : 3476 - 3480
  • [30] Energy-Efficient Power Allocation for Delay-Constrained Systems
    Musavian, Leila
    Tho Le-Ngoc
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 3554 - 3559